Pub Date : 2018-08-01DOI: 10.1109/ICCUBEA.2018.8697556
D. Chaudhari, E. Umamaheswari
Internet of Things (IoT) has revolutionized the information technology (IT) sector since it provides the real-time information to the users. IoT finds application in the various sectors, such as healthcare, transport, and education, etc. IoT healthcare is the emerging technology which allows the diverse distribution of the healthcare services to the persons at the real time. IoT technology has gradually been applied to industries and everyday life in general including healthcare, where people can access hospital information systems to view personal health and medical information. Still, due to security vulnerabilities, personal health and medical information is prone to hacking attacks. Thus, concerns over privacy invasion have come to the fore, and at the same time security issues are considered to override information services.
{"title":"Survey on Data Management for Healthcare Using Internet of Things","authors":"D. Chaudhari, E. Umamaheswari","doi":"10.1109/ICCUBEA.2018.8697556","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697556","url":null,"abstract":"Internet of Things (IoT) has revolutionized the information technology (IT) sector since it provides the real-time information to the users. IoT finds application in the various sectors, such as healthcare, transport, and education, etc. IoT healthcare is the emerging technology which allows the diverse distribution of the healthcare services to the persons at the real time. IoT technology has gradually been applied to industries and everyday life in general including healthcare, where people can access hospital information systems to view personal health and medical information. Still, due to security vulnerabilities, personal health and medical information is prone to hacking attacks. Thus, concerns over privacy invasion have come to the fore, and at the same time security issues are considered to override information services.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125202705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCUBEA.2018.8697885
D. Gothawal, S. Nagaraj
Recently, the evolving technologies in wireless communication demand the integration of Wireless Sensor Network (WSN) with the Internet of Things (IoT). The IoT exploits the standard Internet Protocol (IP) to connect smart sensors worldwide and utilizes the sensed data in various functions such as identification, location, tracking, monitoring, and so on. Several attacks are characterized by IoT in the routing criteria. Hence analysis should be held to reduce those attacks for improving the performance. In this survey, various applications of IoT routing and performance measures of security with the tools available to implement IoT environment is presented. This paper also surveys various routing attacks and focuses on defense mechanisms in brief.
{"title":"Review on Routing Performance Matrices, Tools, Security Attacks and Defense Mechanisms in Context of Internet of Things","authors":"D. Gothawal, S. Nagaraj","doi":"10.1109/ICCUBEA.2018.8697885","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697885","url":null,"abstract":"Recently, the evolving technologies in wireless communication demand the integration of Wireless Sensor Network (WSN) with the Internet of Things (IoT). The IoT exploits the standard Internet Protocol (IP) to connect smart sensors worldwide and utilizes the sensed data in various functions such as identification, location, tracking, monitoring, and so on. Several attacks are characterized by IoT in the routing criteria. Hence analysis should be held to reduce those attacks for improving the performance. In this survey, various applications of IoT routing and performance measures of security with the tools available to implement IoT environment is presented. This paper also surveys various routing attacks and focuses on defense mechanisms in brief.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121032479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCUBEA.2018.8697488
Ankit R. Patel, S. Azadi, M. Babaee, N. Mollaei, Kalpesh L. Patel, Dhirendra Mehta
The advent of robotics itself a revolutionary process or change. It affect in factory automation in such a way that the process to the product path in manufacturing is totally changed. This operation performed by the robots and intelligent systems change the perspective of the industry by the end of 20th century. The field of robotics challenges among researchers, academicians and in the industry since last two decades. This is due to its vast application in every field includes medical, manufacturing, engineering, goods and transportation, defence, smart cities, etc. Today, robotics/robots are not only bounded by the process automation, but they are integrated part of Internet of Things (IoT) to provide some unsolved solutions. A robot as a service having all key features of IoT like autonomous, mobile, sensing and action taking. The infrastructure facility provided by the IoT facilitate to provider to use as a connected things and establish connections with other things using Internet, either as a end user and/or source of so called information. This paper clearly describes how robotics and IoT work together at different platforms.
{"title":"Significance of Robotics in Manufacturing, Energy, Goods and Transport Sector in Internet of Things (IoT) Paradigm","authors":"Ankit R. Patel, S. Azadi, M. Babaee, N. Mollaei, Kalpesh L. Patel, Dhirendra Mehta","doi":"10.1109/ICCUBEA.2018.8697488","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697488","url":null,"abstract":"The advent of robotics itself a revolutionary process or change. It affect in factory automation in such a way that the process to the product path in manufacturing is totally changed. This operation performed by the robots and intelligent systems change the perspective of the industry by the end of 20th century. The field of robotics challenges among researchers, academicians and in the industry since last two decades. This is due to its vast application in every field includes medical, manufacturing, engineering, goods and transportation, defence, smart cities, etc. Today, robotics/robots are not only bounded by the process automation, but they are integrated part of Internet of Things (IoT) to provide some unsolved solutions. A robot as a service having all key features of IoT like autonomous, mobile, sensing and action taking. The infrastructure facility provided by the IoT facilitate to provider to use as a connected things and establish connections with other things using Internet, either as a end user and/or source of so called information. This paper clearly describes how robotics and IoT work together at different platforms.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124775904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCUBEA.2018.8697732
Aditee Jadhav, Nikhil Jadhav
The variations of concept in unceasingly evolving data streams is defined as concept drift. It is needed to address the problems raised due to concept drifts and to adapt the concept drift in existing system for enhanced performance in nonstationary environment. This can be accomplished by designing classification system such a way that, concept drift is considered and hidden, meaningful knowledge is also extracted. The paper discusses different techniques to handle concept drifts and applications of concept drift in real world.
{"title":"Learning Using Concept Drifts: An Overview","authors":"Aditee Jadhav, Nikhil Jadhav","doi":"10.1109/ICCUBEA.2018.8697732","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697732","url":null,"abstract":"The variations of concept in unceasingly evolving data streams is defined as concept drift. It is needed to address the problems raised due to concept drifts and to adapt the concept drift in existing system for enhanced performance in nonstationary environment. This can be accomplished by designing classification system such a way that, concept drift is considered and hidden, meaningful knowledge is also extracted. The paper discusses different techniques to handle concept drifts and applications of concept drift in real world.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126626985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCUBEA.2018.8697222
J. Shinde, P. N. Shinde, Ankur A. Misra
The compact design of hexagonal shaped meander line antenna patch is proposed in this paper with CPW feeding technique. The design comprises of FR4 as substrate with dimensions $50times 50 mathbf{mm}^{2}$. The hexagonal patch is modified by inserting slots in the radiating patch and is used to control the bandwidth. The proposed antenna provides ultrawideband(UWB) operation from 2.82 to 7 GHz with impedance bandwidth of 4.91 GHz. The peak gain over the operating bandwidth is 4.25 dB and radiation efficiency is 88%. The antenna has circular polarization due to slots cut at the center of radiating patch. The proposed antenna is having axial ratio bandwidth of 401 MHz. The ultrawideband operation of the antenna with circular polarization makes it a suitable candidate for S and C band satellite communication as well as it can be used for WiFi(802.11a) and WiMAX(802.16d) application.
{"title":"A CPW-Fed Hexagonal Meander Antenna for Circular Polarization","authors":"J. Shinde, P. N. Shinde, Ankur A. Misra","doi":"10.1109/ICCUBEA.2018.8697222","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697222","url":null,"abstract":"The compact design of hexagonal shaped meander line antenna patch is proposed in this paper with CPW feeding technique. The design comprises of FR4 as substrate with dimensions $50times 50 mathbf{mm}^{2}$. The hexagonal patch is modified by inserting slots in the radiating patch and is used to control the bandwidth. The proposed antenna provides ultrawideband(UWB) operation from 2.82 to 7 GHz with impedance bandwidth of 4.91 GHz. The peak gain over the operating bandwidth is 4.25 dB and radiation efficiency is 88%. The antenna has circular polarization due to slots cut at the center of radiating patch. The proposed antenna is having axial ratio bandwidth of 401 MHz. The ultrawideband operation of the antenna with circular polarization makes it a suitable candidate for S and C band satellite communication as well as it can be used for WiFi(802.11a) and WiMAX(802.16d) application.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114938083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCUBEA.2018.8697404
Kunal Khadilkar, S. Kulkarni, Poojarani Bone
Every day, huge amounts of unstructured text is getting generated. Most of this data is in the form of essays, research papers, patents, scholastic articles, book chapters etc. Many plagiarism softwares are being developed to be used in order to reduce the stealing and plagiarizing of Intellectual Property (IP). Current plagiarism softwares are mainly using string matching algorithms to detect copying of text from another source. The drawback of some of such plagiarism softwares is their inability to detect plagiarism when the structure of the sentence is changed. Replacement of keywords by their synonyms also fails to be detected by these softwares. This paper proposes a new method to detect such plagiarism using semantic knowledge graphs. The method uses Named Entity Recognition as well as semantic similarity between sentences to detect possible cases of plagiarism. The doubtful cases are visualized using semantic Knowledge Graphs for thorough analysis of authenticity. Rules for active and passive voice have also been considered in the proposed methodology.
{"title":"Plagiarism Detection Using Semantic Knowledge Graphs","authors":"Kunal Khadilkar, S. Kulkarni, Poojarani Bone","doi":"10.1109/ICCUBEA.2018.8697404","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697404","url":null,"abstract":"Every day, huge amounts of unstructured text is getting generated. Most of this data is in the form of essays, research papers, patents, scholastic articles, book chapters etc. Many plagiarism softwares are being developed to be used in order to reduce the stealing and plagiarizing of Intellectual Property (IP). Current plagiarism softwares are mainly using string matching algorithms to detect copying of text from another source. The drawback of some of such plagiarism softwares is their inability to detect plagiarism when the structure of the sentence is changed. Replacement of keywords by their synonyms also fails to be detected by these softwares. This paper proposes a new method to detect such plagiarism using semantic knowledge graphs. The method uses Named Entity Recognition as well as semantic similarity between sentences to detect possible cases of plagiarism. The doubtful cases are visualized using semantic Knowledge Graphs for thorough analysis of authenticity. Rules for active and passive voice have also been considered in the proposed methodology.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116201445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCUBEA.2018.8697558
Sanjay R. Sange, S. M. Patil, Sudeep D. Thepade, Nilesh N. Gawade
Basically half tone technique is used in Printing technology. The fundamental principle of half tone technique is to convert 8-bit pixel representation to 1-bit using half tone operators. This 1-bit gives wide scope to hide half tone image in an image. The performance of proposed Small half tone operator is compared with standard Floyd-Steinberg. Experimentation is carried out by hiding different 8 half tone images in carrier image. Performance of error doped image is measured majorly in two ways, one quality is measured by Correlation and Structural Similarity Index Matrix (SSIM). Second introduction of error is measured by Root Mean Square Error (RMSE). In this paper, application of half tone technique can be used for steganography, optimization of storage, image data compression, encryption and watermarking is described.
{"title":"Steganography: Hiding Half Tone Images","authors":"Sanjay R. Sange, S. M. Patil, Sudeep D. Thepade, Nilesh N. Gawade","doi":"10.1109/ICCUBEA.2018.8697558","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697558","url":null,"abstract":"Basically half tone technique is used in Printing technology. The fundamental principle of half tone technique is to convert 8-bit pixel representation to 1-bit using half tone operators. This 1-bit gives wide scope to hide half tone image in an image. The performance of proposed Small half tone operator is compared with standard Floyd-Steinberg. Experimentation is carried out by hiding different 8 half tone images in carrier image. Performance of error doped image is measured majorly in two ways, one quality is measured by Correlation and Structural Similarity Index Matrix (SSIM). Second introduction of error is measured by Root Mean Square Error (RMSE). In this paper, application of half tone technique can be used for steganography, optimization of storage, image data compression, encryption and watermarking is described.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122746715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCUBEA.2018.8697568
R. Joshi
The basic purpose of the following paper in to introduce a solution. This solution can make the medical related facilities more affordable, available and accessible to the society so that every common man can make use out of it. I named this plan as medricstore. The name combines the three words that is medical, generic and store. The basic purpose is to create the medical store aims to facilitate the generic medicine [1] to the society. It also plans to connect the people from all around the country with the hospitals which conducts affordable eye and heart operations in the country. With the purpose of creating health awareness this plan also includes providing the health kit to the people who includes all the light weight food which should be our diet for one month and also providing them a trainer for one month. Thus the health kit helps the customers to manage their health remaining indoors. Our plan will accomplish its first purpose with the help of the Jan aushadi yojna of government. This organization of the government manufacturers' generic medicines. To achieve its second objective, we will tie ups with the doctors of the specific hospitals and also will create the organization of such doctors also. We will intend to open such hospitals in the part of the country where these hospitals are absent. The objective of the startup is to create a healthy society in each and every aspect. The plan aspires to bestow the medical related facility right at the doors of the patients. Our vision and our mission are to organize the medical facility under one roof of the nation and to make a health conscious society for betterment in future. In this way by performing the above said streams we will provide the high quality, affordable and accessible, preventive, curative, primitive and comprehensive health care services to the population.
{"title":"Medricstore: The Best Way of Medicine Facility for Society","authors":"R. Joshi","doi":"10.1109/ICCUBEA.2018.8697568","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697568","url":null,"abstract":"The basic purpose of the following paper in to introduce a solution. This solution can make the medical related facilities more affordable, available and accessible to the society so that every common man can make use out of it. I named this plan as medricstore. The name combines the three words that is medical, generic and store. The basic purpose is to create the medical store aims to facilitate the generic medicine [1] to the society. It also plans to connect the people from all around the country with the hospitals which conducts affordable eye and heart operations in the country. With the purpose of creating health awareness this plan also includes providing the health kit to the people who includes all the light weight food which should be our diet for one month and also providing them a trainer for one month. Thus the health kit helps the customers to manage their health remaining indoors. Our plan will accomplish its first purpose with the help of the Jan aushadi yojna of government. This organization of the government manufacturers' generic medicines. To achieve its second objective, we will tie ups with the doctors of the specific hospitals and also will create the organization of such doctors also. We will intend to open such hospitals in the part of the country where these hospitals are absent. The objective of the startup is to create a healthy society in each and every aspect. The plan aspires to bestow the medical related facility right at the doors of the patients. Our vision and our mission are to organize the medical facility under one roof of the nation and to make a health conscious society for betterment in future. In this way by performing the above said streams we will provide the high quality, affordable and accessible, preventive, curative, primitive and comprehensive health care services to the population.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129239310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCUBEA.2018.8697486
Mehmood Deshmukh, Viraj Shastri, Jerin John, Mit Jain, Deepak Sharma
This paper introduces a modular approach to the task of factoid Question Answering based on a given context. This involves breaking down the task into subtasks and using traditional NLP techniques along with Deep Neural Networks to solve each subtask independently. Many disadvantages of using end-to-end neural networks for the complex task of Question Answering are overcome with the use of a modular approach. The paper also introduces a new Neural Network based approach for the Answer Extraction subtask, called the VDT Node Ranker. The results obtained using the system with limited amount of training fall below expectations, although that of the VDT Node Ranker alone are quite impressive.
{"title":"EruditeX: A Comprehension Based Question Answering System","authors":"Mehmood Deshmukh, Viraj Shastri, Jerin John, Mit Jain, Deepak Sharma","doi":"10.1109/ICCUBEA.2018.8697486","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697486","url":null,"abstract":"This paper introduces a modular approach to the task of factoid Question Answering based on a given context. This involves breaking down the task into subtasks and using traditional NLP techniques along with Deep Neural Networks to solve each subtask independently. Many disadvantages of using end-to-end neural networks for the complex task of Question Answering are overcome with the use of a modular approach. The paper also introduces a new Neural Network based approach for the Answer Extraction subtask, called the VDT Node Ranker. The results obtained using the system with limited amount of training fall below expectations, although that of the VDT Node Ranker alone are quite impressive.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126774975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCUBEA.2018.8697411
Neha Atul Godse, Shaunak Deodhar, Shubhangi Raut, P. Jagdale
In the current scenario, the end user of Information Technology Service Management (ITSM) application in software companies has to keep on searching the solution for problems he is facing or else finally generate a ticket since he cannot collaborate with the system by asking questions and getting relevant answers. As a solution to this, we aim to design a chatbot that will be specifically tailored for software firm employees. The chatbot can process input using Natural Language Processing (NLP) and can generate a relevant response which will help the end user to solve his query. The chatbot makes decisions itself to answer user's query with the help of the IBM Watson Conversation APIs. It will also remember the context of the conversation and perform tasks such as creation of ticket on behalf of the user.
在当前的场景中,软件公司的it服务管理(Information Technology Service Management, ITSM)应用程序的最终用户由于无法通过提问和获得相关答案与系统协作,因此必须不断地搜索他所面临的问题的解决方案,否则最终会生成票据。为了解决这个问题,我们的目标是设计一个专门为软件公司员工定制的聊天机器人。聊天机器人可以使用自然语言处理(NLP)处理输入,并可以生成相关的响应,这将有助于最终用户解决他的查询。在IBM Watson Conversation api的帮助下,聊天机器人自己做出决定来回答用户的查询。它还将记住对话的上下文,并执行诸如代表用户创建票据之类的任务。
{"title":"Implementation of Chatbot for ITSM Application Using IBM Watson","authors":"Neha Atul Godse, Shaunak Deodhar, Shubhangi Raut, P. Jagdale","doi":"10.1109/ICCUBEA.2018.8697411","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697411","url":null,"abstract":"In the current scenario, the end user of Information Technology Service Management (ITSM) application in software companies has to keep on searching the solution for problems he is facing or else finally generate a ticket since he cannot collaborate with the system by asking questions and getting relevant answers. As a solution to this, we aim to design a chatbot that will be specifically tailored for software firm employees. The chatbot can process input using Natural Language Processing (NLP) and can generate a relevant response which will help the end user to solve his query. The chatbot makes decisions itself to answer user's query with the help of the IBM Watson Conversation APIs. It will also remember the context of the conversation and perform tasks such as creation of ticket on behalf of the user.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124230656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}